ryantig / grepcidr
grepcidr can be used to filter a list of IP addresses against one or more Classless Inter-Domain Routing (CIDR) specifications, or arbitrary networks
☆26Updated last year
Alternatives and similar repositories for grepcidr:
Users that are interested in grepcidr are comparing it to the libraries listed below
- Short guide on how to achieve BGP spoofing and implement a MiTM attack against SSH☆20Updated 4 years ago
- Identify servers running various SSL VPNs based on protocol-specific behaviors☆84Updated 6 months ago
- egrets monitors egress☆45Updated 5 years ago
- Provides an overview of the inner file structure of a PDF☆25Updated 2 years ago
- An nmap script to produce target lists for use with various tools.☆33Updated 3 years ago
- ☆15Updated 3 years ago
- Example tools for detecting software using OpenSSL 3.0.0 - 3.0.6 (vulnerable to latest unnamed vulnerability)☆42Updated 2 years ago
- Parser for Windows PowerShell script block logs☆13Updated 3 months ago
- Qemuno Framework☆24Updated 2 years ago
- ☆29Updated 4 months ago
- The SSH Multiplex Backdoor Tool☆64Updated 5 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆35Updated last year
- Fun tools around the EBS Direct API☆18Updated 4 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 2 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆54Updated 4 years ago
- Tool to tackle problematic dangling domains in Amazon Web Services.☆14Updated 7 years ago
- Collection of Slides From My Conference Talks☆20Updated 2 years ago
- A meta-database collecting resources that compile lists of breaches☆18Updated 5 months ago
- Decloak Linux stealth rootkits hiding data with this simple memory mapped IO investigation tool.☆23Updated 2 years ago
- details about DIAL protocol vulnerabilities☆28Updated last year
- Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 2 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 6 months ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- python3 scripts to help with aws triage needs☆15Updated 3 years ago
- ☆14Updated 3 years ago
- Ansible role for security standards compliance☆13Updated 6 years ago
- self-hosted Azure OSINT tool☆29Updated 7 months ago
- A multicast DNS and DNS Service Discovery Security Assessment Tool☆69Updated last year
- List CVEs and details that apply to your infrastructure (pre-inventoried).☆10Updated 4 years ago
- Security Alert Decoration☆27Updated 3 weeks ago